Protocol agent field details

This topic provides information about the field options that are available in the new protocol type dialog-box, when you create a new protocol agent for a network service.

Note: The field options that are available in the dialog-box changes as per the type of protocol agent that is selected.
The following table contains the information about the field options:
Protocol Agent Field Type Description
FP_CIS Name Text field Enter a custom name for the protocol.
Description Text field Enter a description for the protocol for easy identification.
Handle incoming CIS connections Check-box
  • Checked — Enables incoming CIS connection handling.
  • Unchecked — Disables incoming CIS connection handling.
GRE Name Text field Enter a custom name for the protocol.
Description Text field Enter a description for the protocol for easy identification.
Apply Tunnel Rematch Check-box
  • Checked — Rematches the encapsulated payload inside the tunneling packet until the maximum rematch count defined in the engine properties is reached.
  • Unchecked — Does not rematch encapsulated payload.
Tunnel IPv4 protocol Check-box
  • Checked — Allows tunneling over IPv4.
  • Unchecked — Stops connections that are tunneled over IPv4.
Tunnel IPv6 protocol Check-box
  • Checked — Allows tunneling over IPv6.
  • Unchecked — Stops connections that are tunneled over IPv6.
IPv4 Encapsulation Name Text field Enter a custom name for the protocol.
Description Text field Enter a description for the protocol for easy identification.
Apply Tunnel Rematch Check-box
  • Checked — Rematches the encapsulated payload inside the tunneling packet until the maximum rematch count defined in the engine properties is reached.
  • Unchecked — Does not rematch encapsulated payload.
Next Ethernet Type Text field Enter the Ethernet frame type used for examining the encapsulated packet.
DNS Name Text field Enter a custom name for the protocol.
Description Text field Enter a description for the protocol for easy identification.
Enforce DNS protocol usage Check-box
  • Checked — Terminates traffic that is not using the DNS protocol.
  • Unchecked — Allows traffic to pass even if the traffic is not DNS-related.
Deny DDNS updates Check-box
  • Checked — Terminates traffic that is not using the DNS protocol.
  • Unchecked — Allows traffic to pass even if the traffic is not DNS-related.
Deny DNS zone transfer Check-box
  • Checked — Terminates DNS zone transfer messages.
  • Unchecked — Allows DNS zone transfer messages to pass.
Enforce Google Safesearch Check-box
  • Checked — Modifies DNS replies for Google search engines to enforce Google's SafeSearch feature.
  • Unchecked — Does not modify DNS replies.
Enforce strict Bing Safesearch Check-box
  • Checked — Modifies DNS replies for Bing search engines to enforce Bing’s SafeSearch feature.
  • Unchecked — Does not modify DNS replies.
Enforce strict DuckDuckGo Safesearch Check-box
  • Checked — Modifies DNS replies for DuckDuckGo search engines to enforce DuckDuckGo’s SafeSearch feature.
  • Unchecked — Does not modify DNS replies.
Enforce Youtube Safesearch Drop-down list

Select the safesearch mode from the drop-down list:

  • Strict: Filter out inappropriate videos from your search results.
  • Moderate: This setting is similar to Strict Mode but makes a much larger collection of videos available.
  • Off: Use this setting to turn off both Modes (Strict and Moderate). Only apply this setting if you want to let users in your organization to have unrestricted YouTube access.
FTP or SSM FTP Proxy Name Text field Enter a custom name for the protocol.
Description Text field Enter a description for the protocol for easy identification.
Allow related connections Check-box
  • Checked — Allows data connections to be opened with the control connection.
  • Unchecked — Disables the Protocol Agent.
Allow active mode Check-box

Checked — Server is allowed to open data connections to the client (according to information exchanged in the control connection).

Unchecked — Server-initiated data connections are forbidden.
Allow passive mode Check-box
  • Checked — Client is allowed to open data connections to the server (according to information exchanged in the control connection).
  • Unchecked — Client-initiated data connections are forbidden.
Control data inspection mode Check-box
  • Strict — If commands that do not comply with the RFC 959 FTP standard are used, the connection is dropped.
  • Loose — The Protocol Agent tries to identify information for opening the data connection even if the communications do not strictly follow the FTP standards. Sometimes needed with non-standard FTP configurations.

Highest allowed source port for Active data connection

or

Lowest allowed source port for Active data connection
Text Field

Enter a port value to limit the range of allowed source ports for active data connections on the server.

Value 0 for the lowest port means that the server always uses the port number immediately preceding the destination port. If the server uses a standard port, both the lowest and highest port number must be 0.

Redirect to Proxy Server Text field
Select the Proxy Server to which the connections are redirected.
Note: The recommended method for forwarding traffic to a proxy service is to use Access rules.

(Optional) Specify the IP Address Translation Range (IPv4 only) and the Port Translation Range for the redirection. To specify a single IP address, enter the same IP address in both fields.

Note: This option is not supported for SSM Proxies.
HTTP or HTTPS Name Text field Enter a custom name for the protocol.
Description Text field Enter a description for the protocol for easy identification.
TLS inspection

(HTTPS only)

Drop-down Menu Controls whether TLS decryption of HTTPS traffic is enabled, not enabled, or forbidden.
  • Forbidden — Traffic is never decrypted.
  • Yes — Enables HTTPS decryption and inspection.
  • No — HTTPS traffic is not decrypted for inspection.
Logging of Accessed URLs Check-box
  • Checked — The URLs of sites that users access are included in generated log entries.
    Note: With HTTPS traffic, it is required that the traffic is decrypted.
  • No — URLs are not included in generated log entries.
Optimized server stream fingerprinting Check-box
  • Checked — When matching connections to the Inspection rules, the server stream matching is done only for patterns that are valid for the client’s browser type and version.
  • Unchecked — All server stream patterns are matched.
Enforce SafeSearch Check-box
  • Checked — The engine modifies DNS replies for search engines to enforce SafeSearch feature.
  • Unchecked — The engine does not modify DNS replies.
Redirect connections to Proxy Server Text Field

Specify the IP Address Translation Range (IPv4 only) and the Port Translation Range for the redirection.

Note: This option is not supported for SSM Proxies.
Strip QUIC support from server replies Check-box
  • Checked — HTTP header that indicates the server support for HTTP3/QUIC is stripped away.
  • Unchecked — HTTP header that indicates the server support for HTTP3/QUIC is not stripped away.
Note: For HTTPS, stripping can be done only if HTTPS is being decrypted with TLS Inspection.
HTTP with SSM HTTP Proxy Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
Logging of accessed URLs Check-box
  • Checked — The URLs of sites that users access are included in generated log entries.
    Note: With HTTPS traffic, it is required that the traffic is decrypted.
  • Unchecked — URLs are not included in generated log entries.
Optimized server stream fingerprinting Check-box
  • Checked — When matching connections to the Inspection rules, the server stream matching is done only for patterns that are valid for the client’s browser type and version.
  • Unchecked — All server stream patterns are matched.
Redirect to Proxy Server Text Field Specify the IP Address Translation Range (IPv4 only) and the Port Translation Range for the redirection.
Note: This option is not supported for SSM Proxies.
Enforce SafeSearch Check-box
  • On — The engine modifies DNS replies for search engines to enforce SafeSearch feature.
  • Off — The engine does not modify DNS replies.
Enforce Strict Headers Check-box When selected, the proxy blocks HTTP requests and responses that do not comply with the HTTP protocol standards.
Request Validation Check-box

When selected, the proxy validates HTTP requests.

Disallow Unicode in URL Paths Check-box When selected, unicode-encoded text is not allowed in URL paths.
Disallow Unicode URL Queries Check-box When selected, unicode-encoded text is not allowed in query strings in URLs.
Enforce Strict URL Paths Check-box When selected, the proxy blocks URL paths that contain characters that are not allowed by the HTTP protocol standards.
Enforce Strict URL Queries Check-box When selected, the proxy blocks queries that contain characters that are not allowed by the HTTP protocol standards.
URL Normalization Validation Drop-down list

Specifies how URL normalization is applied to HTTP requests:

  • Allow — Allows the request.
  • Allow and Log — Allows the request and creates a log entry.
  • Block and Log — Blocks the request and creates a log entry.
  • Off — URL normalization is not enabled.
Maximum URL Length Text Field Specifies the maximum number of characters allowed in URLs.
Require HTTP Version Check-box

When selected, the proxy requires the HTTP request to include an HTTP version string.

Allow HTTP version 1.0 Check-box When selected, the proxy allows HTTP requests that specify HTTP version 1.0 as the version string.
Allow HTTP version 1.1 Check-box When selected, the proxy allows HTTP requests that specify HTTP version 1.1 as the version string.
Allow or Deny Specified URL Matches Drop-down list

Specifies whether matching URLs are allowed or denied:

  • Allow — Matching URLs are allowed.
  • Deny — Matching URLs are denied.
URL Match List Text Field Specifies the criteria for matching URLs.
Allowed HTTP Commands Drop-down list
  • Any — The proxy allows any commands in HTTP requests.
  • List — The proxy allows only the selected commands in HTTP requests.
Deny SOAP Check-box When selected, the proxy denies the use of simple object access protocol (SOAP) in HTTP requests.
Log URLs Check-box When selected, the proxy logs the URLs in HTTP requests.
HTTP with SSM TCP Proxy or HTTPS with SSM TCP Proxy Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
TLS Inspection Drop-down list Controls whether TLS decryption of HTTPS traffic is enabled, not enabled, or forbidden.
  • Forbidden — Traffic is never decrypted.
  • Yes — Enables HTTPS decryption and inspection.
  • No — HTTPS traffic is not decrypted for inspection.
HTTPS Inspection Exceptions Text Field/Drop-down list

Specifies the HTTPS Inspection Exceptions according to which traffic is decrypted and inspected or allowed to pass without decryption.

Click in the text field to select an HTTPS Inspection Exceptions element.

Note: You can click the New Inspection Policy button to create a new inspection policy.
Logging of accessed URLS Check-box
  • Checked — The URLs of sites that users access are included in generated log entries.
    Note: With HTTPS traffic, requires that the traffic is decrypted.
  • Unchecked — URLs are not included in generated log entries.
Optimized server stream fingerprinting Check-box
  • Checked — When matching connections to the Inspection rules, the server stream matching is done only for patterns that are valid for the client’s browser type and version.
  • Unchecked — All server stream patterns are matched.
Enforce SafeSearch Check-box
  • Checked — The engine modifies DNS replies for search engines to enforce SafeSearch feature.
  • Unchecked — The engine does not modify DNS replies.
H323 Name Text field Enter a custom name for the protocol.
Description Text field Enter a description for the protocol for easy identification.
Allow related connections Check-box
  • Checked — The Protocol Agent monitors the H.323 connection and allows the related connections in Access and NAT rules.
  • Unchecked — Disables the Protocol Agent.
Allow special logical channels through (No NAT) Check-box
  • Checked — Allows H.323 clients to open a special logical channel for audio and video without NAT.
  • Unchecked — Special logical channels are not allowed.
IMAPS Name Text field Enter a custom name for the protocol.
Description Text field Enter a description for the protocol for easy identification.
TLS inspection Drop-down list Controls whether TLS decryption of HTTPS traffic is enabled, not enabled, or forbidden.
  • Forbidden — Traffic is never decrypted.
  • Yes — Enables HTTPS decryption and inspection.
  • No — HTTPS traffic is not decrypted for inspection.
IMAPS Inspection Exceptions Text Field/Drop-down list

Specifies the IMAPS Inspection Exceptions according to which traffic is decrypted and inspected or allowed to pass without decryption.

Click in the text field to select an IMAPS Inspection Exceptions element.

Note: You can click the New Inspection Policy button to create a new inspection policy.
MSRPC Name Text field Enter a custom name for the protocol.
Description Text field Enter a description for the protocol for easy identification.
Allow related connections Check-box
  • Checked — Allows responses sent by the endpoint mapper (EPM) service.
  • Unchecked — Disables the Protocol Agent.
Allow MS Exchange Remote administration service Check-box
  • Checked — Allows remote administration of the Microsoft Exchange server through the Exchange System Attendant service.
  • Unchecked — Prevents remote administration.
Allow MS Exchange user services Check-box
  • Checked — Allows the normal use of the Microsoft Outlook client; the Protocol Agent allows the use of Exchange Database service, Directory service, Information Store service, MTA service, and Store service.
  • Unchecked — Prevents end-user services.
Allow any UUID in endpoint mapping Check-box
  • Checked — Allows other MSRPC requests in addition to Outlook/Exchange.
  • Unchecked — The Service allows only Outlook/Exchange traffic.
Allow other RPC traffic Check-box
  • Checked — Allows message types that are not supported by the Protocol Agent to bypass the control connection.
  • Unchecked — Allows only supported message types (bind, bind ack, request, and response).
Oracle Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
Allow related connections Check-box
  • Checked — Allows database connection based on information in the listener connection.
  • Unchecked — Disables the Protocol Agent.
Max. length allowed for one TNS packet Text Field Enter the maximum amount of TCP payload data that each Oracle TNS packet is allowed to carry.
Netmask for allowed server addresses Text Field Enter a netmask for limiting the allowed traffic. The value 255.255.255.255 allows the database connection only to the address in which the Oracle Listener service is located. The value 0.0.0.0 allows database connections to all addresses.
Set checksum to zero for modified TNS packets Check-box
  • Checked — Resets the header and packet checksums to zero when the Protocol Agent modifies the packet payload data.
  • Unchecked — Checksums remain even when the packet is changed.
POP3S Name Text field Enter a custom name for the protocol.
Description Text field Enter a description for the protocol for easy identification.
TLS Inspection Drop-down list Controls whether TLS decryption of HTTPS traffic is enabled, not enabled, or forbidden.
  • Forbidden — Traffic is never decrypted.
  • Yes — Enables HTTPS decryption and inspection.
  • No — HTTPS traffic is not decrypted for inspection.
POP3S Inspection Exceptions Text Field/Drop-down list Specifies the POP3S Inspection Exceptions according to which traffic is decrypted and inspected or allowed to pass without decryption. Click to select an POP3S Inspection Exceptions element.
Note: You can click the New Inspection Policy button to create a new inspection policy.
Protocol Identification Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
TLS Inspection Drop-down list Controls whether TLS decryption of HTTPS traffic is enabled, not enabled, or forbidden.
  • Forbidden — Traffic is never decrypted.
  • Yes — Enables HTTPS decryption and inspection.
  • No — HTTPS traffic is not decrypted for inspection.
HTTPS Inspection Exceptions Text Field/Drop-down list Specifies the HTTPS Inspection Exceptions according to which traffic is decrypted and inspected or allowed to pass without decryption. Click to select an HTTPS Inspection Exceptions element.
Note: You can click the New Inspection Policy button to create a new inspection policy.
RTSP Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
Allow related connections Check-box
  • Checked — Related RTP and RTCP connections initiated with RTSP are allowed through the engine.
  • Unchecked — Disables the Protocol Agent.
Shell Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
Allow related connections Check-box
  • Checked — Standard error (stderr) stream is allowed through the engine as a response to an RSH command.
  • Unchecked — Disables the Protocol Agent.
SIP Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
Allow related connections Check-box
  • Checked — Allows SIP media connections based on the signaling connection.
  • Unchecked — Disables the Protocol Agent.
Enforce client side media Check-box
  • Checked — Requires that the media stream uses the same client-side address as the transport layer.
  • Unchecked — Media stream can use any address.
Enforce server side media Check-box
  • Checked — Requires that the media stream uses the same server-side address as the transport layer.
  • Unchecked — Media stream can use any address.
Maximum number of calls Text Field The maximum number of calls allowed by the Access rule. If the value is 0, no limit is set for the number of calls.
SMTP or SMTPS Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
Redirect to Proxy Server Text Field Specify the IP Address Translation Range (IPv4 only) and the Port Translation Range for the redirection.
Note: This option is not supported for SSM Proxies.
TLS Inspection Drop-down list Controls whether TLS decryption of HTTPS traffic is enabled, not enabled, or forbidden.
  • Forbidden — Traffic is never decrypted.
  • Yes — Enables HTTPS decryption and inspection.
  • No — HTTPS traffic is not decrypted for inspection.
HTTPS Inspection Exceptions Text Field/Drop-down list Specifies the HTTPS Inspection Exceptions according to which traffic is decrypted and inspected or allowed to pass without decryption. Click to select an HTTPS Inspection Exceptions element.
Note: You can click the New Inspection Policy button to create a new inspection policy.
SSH or SSH with SSM TCP Proxy Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
Make protocol validation Check-box
  • Checked — Validates the SSH transfers according to the parameters defined in this dialog.
  • Unchecked — Disables the Protocol Agent.
Bytes allowed from client before Server ID Text Field Amount of data that the client is allowed to send to the server before the server sends its own identification string.
Bytes allowed from server before Client ID Text Field Amount of data that the server can send to the client before the client sends its own identification string.
Bytes allowed from server before Server ID Text Field Amount of data that the server can send to the client before the server sends its own identification string.
Sunrpc Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
Learn RPC program number to port mapping for future service matches Check-box When selected, Protocol Agent is enabled.
TCP Proxy Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
Abort on close Text Field Timeout in seconds for aborting a connection counted from when one of the communicating parties initiates the connection closing. The connection is aborted by sending TCP Reset packets to the unresponsive endpoint. Setting this value to 0 disables this timeout (connections are left open).
Idle timeout Text Field Timeout in seconds for closing a connection after the latest transmission. Setting this value to 0 disables this timeout (connections are left open).
Use proxy Check-box
  • Checked — Enables the Protocol Agent.
  • Unchecked — Disables the Protocol Agent.
NetBIOS Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
Make corresponding NAT modifications to payload Check-box
  • Checked — If inserted in a NAT rule, the addresses relayed in the NetBIOS communications are translated according to the NAT rule.
  • Unchecked — Only the IP addresses in packet headers are translated if inserted in a NAT rule.
TFTP or SSM TFTP Proxy Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
Allow related connections Check-box
  • Checked — Allows data connections to be opened with the control connection.
  • Unchecked — Protocol Agent is disabled.
Allow read Check-box
  • Checked — Allows file transfer from server to client (downloads).
  • Unchecked — Downloads are not allowed.
Allow write Check-box
  • Checked — Allows file transfer from client to server (uploads).
  • Unchecked — Uploads are not allowed.
Log filenames and paths Check-box
  • Checked — Names of transferred files and their paths are included in generated log entries.
  • Unchecked — File and path information is not available in logs.
QUIC Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
Discard QUIC if inspection not possible Drop-down list
  • No — QUIC traffic is allowed and enables QUIC inspection.
  • Yes — QUIC traffic is discarded and web browsers uses TLS for traffic inspection if QUIC is not permitted.
  • Default — QUIC traffic is allowed and QUIC inspection is enabled.
Tunnel IPv6 protocol Check-box
  • Checked — Allows tunneling over IPv6.
  • Unchecked — Stops connections that are tunneled over IPv6.
Next Ethernet Type Text field Enter the Ethernet frame type used for examining the encapsulated packet.
SSM HTTP Proxy Name Text Field Enter a custom name for the protocol.
Description Text Field Enter a description for the protocol for easy identification.
Enforce Strict Headers Check-box When selected, the proxy blocks HTTP requests and responses that do not comply with the HTTP protocol standards.
Request Validation Check-box When selected, the proxy validates HTTP requests.
Disallow Unicode in URL Paths Check-box When selected, unicode-encoded text is not allowed in URL paths.
Disallow Unicode URL Queries Check-box When selected, unicode-encoded text is not allowed in query strings in URLs.
Enforce Strict URL Paths Check-box When selected, the proxy blocks URL paths that contain characters that are not allowed by the HTTP protocol standards.
Enforce Strict URL Queries Check-box When selected, the proxy blocks queries that contain characters that are not allowed by the HTTP protocol standards.
URL Normalizatio Validation Drop-down list

Specifies how URL normalization is applied to HTTP requests.

  • Allow — Allows the request.
  • Allow and Log — Allows the request and creates a log entry.
  • Block and Log — Blocks the request and creates a log entry.
Off — URL normalization is not enabled.
Maximum URL Length Text Field Specifies the maximum number of characters allowed in URLs.
Require HTTP Version Check-box When selected, the proxy requires the HTTP request to include an HTTP version string.
Allow HTTP version 1.0 Check-box When selected, the proxy allows HTTP requests that specify HTTP version 1.0 as the version string.
Allow HTTP version 1.1 Check-box When selected, the proxy allows HTTP requests that specify HTTP version 1.1 as the version string.
Allow or Deny Specified URL Matches Drop-down list

Specifies whether matching URLs are allowed or denied.

  • Allow — Matching URLs are allowed.
  • Deny — Matching URLs are denied.
URL Match List Text Field Specifies the criteria for matching URLs.
Allow HTTP Commands Drop-down list
  • Any — The proxy allows any commands in HTTP requests.
  • List — The proxy allows only the selected commands in HTTP requests.
Deny SOAP Check-box When selected, the proxy denies the use of simple object access protocol (SOAP) in HTTP requests.
Log URL Check-box When selected, the proxy logs the URLs in HTTP requests.
Enforce TLS Decryption Check-box When select, enforces TLS decryption.
SSM DNS Proxy Name Text field Enter a custom name for the protocol.
Description Text field Enter a description for the protocol for easy identification.
Enforce DNS protocol usage Check-box
  • Checked — Terminates traffic that is not using the DNS protocol.
  • Unchecked — Allows traffic to pass even if the traffic is not DNS-related.
Deny DNS zone transfers Check-box
  • Checked — Terminates DNS zone transfer messages.
  • Unchecked — Allows DNS zone transfer messages to pass.
Enforce Google SafeSearch Check-box
  • Checked — Modifies DNS replies for Google search engines to enforce Google's SafeSearch feature.
  • Unchecked — Does not modify DNS replies.